Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-38545


This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.


Published

2023-10-18T04:15:11.077

Last Modified

2025-02-13T17:16:47.823

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-787
  • Type: Secondary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application haxx libcurl < 8.4.0 Yes
Operating System fedoraproject fedora 37 Yes
Application netapp active_iq_unified_manager - Yes
Application netapp active_iq_unified_manager - Yes
Application netapp oncommand_insight - Yes
Application netapp oncommand_workflow_automation - Yes
Operating System microsoft windows_10_1809 < 10.0.17763.5122 Yes
Operating System microsoft windows_10_21h2 < 10.0.19044.3693 Yes
Operating System microsoft windows_10_22h2 < 10.0.19045.3693 Yes
Operating System microsoft windows_11_21h2 < 10.0.22000.2600 Yes
Operating System microsoft windows_11_22h2 < 10.0.22621.2715 Yes
Operating System microsoft windows_11_23h2 < 10.0.22631.2715 Yes
Operating System microsoft windows_server_2019 < 10.0.17763.5122 Yes
Operating System microsoft windows_server_2022 < 10.0.20348.2113 Yes

References